Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe000: 0000 [#1] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x00000000ffff0000-0x00000000ffff0007] CPU: 1 UID: 0 PID: 36 Comm: kworker/u8:2 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net RIP: 0010:mld_clear_delrec+0x2a6/0x640 net/ipv6/mcast.c:838 Code: 20 00 0f 85 91 03 00 00 49 8b 5d 28 49 c7 45 28 00 00 00 00 48 85 db 75 37 e9 d4 00 00 00 e8 c1 f5 88 f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 03 00 00 48 8b 2b 48 8d 7b 30 48 89 de e8 RSP: 0018:ffffc90000ac7568 EFLAGS: 00010206 RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a32f646 RDX: ffff8881432c2440 RSI: ffffffff8a32f5df RDI: 0000000000000005 RBP: 0000000000000001 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 R13: ffff8880313e0c00 R14: ffff888027ae5000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff88812486e000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000026000 CR3: 0000000067077000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ipv6_mc_destroy_dev+0x49/0x690 net/ipv6/mcast.c:2842 addrconf_ifdown.isra.0+0x13ef/0x1a90 net/ipv6/addrconf.c:4000 addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3780 notifier_call_chain+0xb9/0x410 kernel/notifier.c:85 call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230 call_netdevice_notifiers_extack net/core/dev.c:2268 [inline] call_netdevice_notifiers net/core/dev.c:2282 [inline] unregister_netdevice_many_notify+0xf9a/0x26f0 net/core/dev.c:12076 unregister_netdevice_many net/core/dev.c:12139 [inline] default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12643 ops_exit_list net/core/net_namespace.c:206 [inline] ops_undo_list+0x363/0xab0 net/core/net_namespace.c:253 cleanup_net+0x408/0x890 net/core/net_namespace.c:686 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402 kthread+0x3c2/0x780 kernel/kthread.c:464 ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:mld_clear_delrec+0x2a6/0x640 net/ipv6/mcast.c:838 Code: 20 00 0f 85 91 03 00 00 49 8b 5d 28 49 c7 45 28 00 00 00 00 48 85 db 75 37 e9 d4 00 00 00 e8 c1 f5 88 f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 03 00 00 48 8b 2b 48 8d 7b 30 48 89 de e8 RSP: 0018:ffffc90000ac7568 EFLAGS: 00010206 RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a32f646 RDX: ffff8881432c2440 RSI: ffffffff8a32f5df RDI: 0000000000000005 RBP: 0000000000000001 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 R13: ffff8880313e0c00 R14: ffff888027ae5000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff88812486e000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000027000 CR3: 0000000067077000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 20 00 and %al,(%rax) 2: 0f 85 91 03 00 00 jne 0x399 8: 49 8b 5d 28 mov 0x28(%r13),%rbx c: 49 c7 45 28 00 00 00 movq $0x0,0x28(%r13) 13: 00 14: 48 85 db test %rbx,%rbx 17: 75 37 jne 0x50 19: e9 d4 00 00 00 jmp 0xf2 1e: e8 c1 f5 88 f7 call 0xf788f5e4 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 0f 85 39 03 00 00 jne 0x36e 35: 48 8b 2b mov (%rbx),%rbp 38: 48 8d 7b 30 lea 0x30(%rbx),%rdi 3c: 48 89 de mov %rbx,%rsi 3f: e8 .byte 0xe8